/frameworks/opt/net/wifi/service/java/com/android/server/wifi/anqp/ |
NAIRealmData.java | 6 import com.android.server.wifi.hotspot2.pps.Credential; 61 public int match(List<String> credLabels, Credential credential) { 82 int match = eapMethod.match(credential) | realmMatch;
|
/system/tpm/attestation/common/ |
tpm_utility.h | 35 // certificate or some other type of credential with the endorsement key. The 37 // owner privilege. The |identity_key_blob| is the key to which the credential 41 // populates the decrypted |credential|. 47 std::string* credential) = 0;
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/pps/ |
Credential.java | 23 public class Credential { 47 public Credential(long ctime, long expTime, String realm, boolean checkAAACert, 75 public Credential(long ctime, long expTime, String realm, boolean checkAAACert, 76 EAPMethod eapMethod, Credential.CertType certType, byte[] fingerPrint) { 95 public Credential(long ctime, long expTime, String realm, boolean checkAAACert, 115 public Credential(Credential other, String password) { 132 public Credential(WifiEnterpriseConfig enterpriseConfig, KeyStore keyStore, boolean update) 282 Credential that = (Credential) o [all...] |
HomeSP.java | 43 private final Credential mCredential; 65 Credential credential) { 80 mCredential = credential; 98 Credential credential, 120 mCredential = credential; 308 public Credential getCredential() { return mCredential; } 369 ", Credential=" + mCredential +
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
Authenticate.java | 34 String credential = Credentials.basic("jesse", "password1"); 36 .header("Authorization", credential)
|
/developers/build/prebuilts/gradle/DirectBoot/ |
README.md | 16 - Credential protected: 23 Credential protected storage is unavailable (an direct boot aware component primarily relies on data stored in the new Device protected storage area, 24 but they may access Credential protected data when unlocked) by adding `directBootAware="true"` in the manifest. 31 Credential protected storage becomes available. The storage APIs on the Context supplied to these components will always point to Credential protected storage by default. 39 because the storage isn't protected by the user's credential (PIN/Pattern/Password)
|
/developers/samples/android/security/DirectBoot/ |
template-params.xml | 91 - Credential protected: 98 Credential protected storage is unavailable (an direct boot aware component primarily relies on data stored in the new Device protected storage area, 99 but they may access Credential protected data when unlocked) by adding `directBootAware="true"` in the manifest. 106 Credential protected storage becomes available. The storage APIs on the Context supplied to these components will always point to Credential protected storage by default. 114 because the storage isn't protected by the user's credential (PIN/Pattern/Password)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/ |
old_run.py | 82 storage: Storage, a ``Storage`` to store the credential in. 87 Credentials, the obtained credential. 153 credential = flow.step2_exchange(code, http=http) 157 storage.put(credential) 158 credential.set_store(storage) 161 return credential
|
tools.py | 152 storage: Storage, a ``Storage`` to store the credential in. 160 Credentials, the obtained credential. 225 credential = flow.step2_exchange(code, http=http) 229 storage.put(credential) 230 credential.set_store(storage) 233 return credential
|
/frameworks/base/services/core/java/com/android/server/ |
LockSettingsService.java | 137 * The UIDs that are used for system credential storage in keystore. 149 void setCredential(String credential, String savedCredential, int userId) 151 byte[] toHash(String credential, int userId); 152 String adjustForKeystore(String credential); 157 // the user unlocks the account and credential-encrypted storage is available. 249 // We store a private credential for the managed user that's unlocked by the primary 250 // account holder's credential. As such, the user will never be prompted to enter this 296 * If the account is credential-encrypted, show notification requesting the user to unlock 826 CredentialHash credential; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
README-HS20 | 34 network block or credential. If a credential is picked (based on ANQP 40 whenever needed based on ANQP information and the credential. 48 will internally determine which network or credential is going to be 104 # credential block 106 # Each credential used for automatic network selection is configured as a set 110 # credential fields: 112 # temporary: Whether this credential is temporary and not to be saved 119 # network (based on either an enabled network block or a credential) 194 # points support authentication with this credential. This is a [all...] |
/libcore/ojluni/src/main/java/javax/security/auth/ |
Subject.java | 65 * private cryptographic keys, are stored within a private credential 68 * within a public credential <code>Set</code>. Different permissions 69 * are required to access and modify the different credential Sets. 82 * Object credential; 84 * // add a Principal and credential to the Subject 86 * subject.getPublicCredentials().add(credential); 149 * To modify the public credential Set, the caller must have 151 * To modify the private credential Set, the caller must have 177 * To modify the public credential Set, the caller must have 179 * To modify the private credential Set, the caller must hav [all...] |
/external/jetty/src/java/org/eclipse/jetty/security/ |
PropertyUserStore.java | 45 import org.eclipse.jetty.util.security.Credential; 159 Credential credential = Credential.getCredential(credentials); local 161 Principal userPrincipal = new KnownUser(username,credential); 164 subject.getPrivateCredentials().add(credential); 177 notifyUpdate(username,credential,roleArray); 305 * @param credential 308 private void notifyUpdate(String username, Credential credential, String[] roleArray [all...] |
MappedLoginService.java | 35 import org.eclipse.jetty.util.security.Credential; 155 * @param info a UserIdentity instance, or a String password or Credential instance 165 Credential credential = (info instanceof Credential)?(Credential)info:Credential.getCredential(info.toString()); local 167 Principal userPrincipal = new KnownUser(userName,credential); 170 subject.getPrivateCredentials().add(credential); 182 * @param credential The users Credential [all...] |
/external/dbus/dbus/ |
dbus-credentials.c | 221 * Checks whether the given credential is present. 224 * @param type the credential to check for 225 * @returns #TRUE if the credential is present 243 _dbus_assert_not_reached ("Unknown credential enum value"); 396 * Merge the given credential found in the second object into the first object, 397 * overwriting the first object's value for that credential. 399 * Does nothing if the second object does not contain the specified credential. 400 * i.e., will never delete a credential from the first object. 403 * @param which the credential to overwrite
|
/frameworks/base/docs/html/training/articles/ |
direct-boot.jd | 25 <li><i>Credential encrypted storage</i>, which is the default storage location 49 credentials, such as a PIN or password, use credential encrypted storage. 50 Credential encrypted storage is only available after the user has successfully 53 credential encrypted storage.</p> 86 device encrypted storage as well as credential encrypted storage.</p> 109 Direct Boot mode, use credential encrypted storage.</p> 114 accessing credential encrypted storage and use regular system services that 144 data between credential encrypted storage and device encrypted storage.</p> 146 <p>Use your best judgment when deciding what data to migrate from credential
|
/frameworks/base/packages/Osu/src/com/android/anqp/eap/ |
EAPMethod.java | 68 addAuthParam(new Credential(authInfoID, len, paramPayload)); 71 addAuthParam(new Credential(authInfoID, len, paramPayload)); 112 public int match(com.android.hotspot2.pps.Credential credential) { 114 EAPMethod credMethod = credential.getEAPMethod();
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/anqp/eap/ |
EAPMethod.java | 69 addAuthParam(new Credential(authInfoID, len, paramPayload)); 72 addAuthParam(new Credential(authInfoID, len, paramPayload)); 113 public int match(com.android.server.wifi.hotspot2.pps.Credential credential) { 115 EAPMethod credMethod = credential.getEAPMethod();
|
/developers/build/prebuilts/gradle/ConfirmCredential/ |
README.md | 2 Android Confirm Credential Sample 40 <img src="screenshots/1-purchase.png" height="400" alt="Screenshot"/> <img src="screenshots/2-show-confirm-credential.png" height="400" alt="Screenshot"/> <img src="screenshots/3-already-authenticated.png" height="400" alt="Screenshot"/> 55 https://github.com/googlesamples/android-Confirm Credential
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpc/ |
auth_des.h | 43 /* A credential */ 73 adv_winverf is the credential window + 1. 88 /* Map a des credential into a unix cred. */
|
auth_unix.h | 52 /* The machine name is part of a credential; it may not exceed 255 bytes */ 55 /* gids compose part of a credential; there may not be more than 16 of them */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpc/ |
auth_des.h | 43 /* A credential */ 73 adv_winverf is the credential window + 1. 88 /* Map a des credential into a unix cred. */
|
auth_unix.h | 52 /* The machine name is part of a credential; it may not exceed 255 bytes */ 55 /* gids compose part of a credential; there may not be more than 16 of them */
|
/system/connectivity/shill/vpn/ |
vpn_driver.cc | 72 << "Property cannot be both an array and a credential"; 102 bool credential = (properties_[i].flags & Property::kCredential); local 105 CHECK(!credential) 106 << "Property cannot be both an array and a credential"; 115 (credential && !save_credentials)) { 120 if (credential) {
|
/system/connectivity/shill/shims/protos/ |
crypto_util.proto | 31 // This protobuf is for sending credential information from shill to the 32 // credential verification shim. The call will fail if public_key is empty
|